Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-12-2022 13:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Pr3tor1an/-Ro3b-botnet/blob/main/Ro3b-botnet.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
https://github.com/Pr3tor1an/-Ro3b-botnet/blob/main/Ro3b-botnet.exe
Resource
win10v2004-20221111-en
General
-
Target
https://github.com/Pr3tor1an/-Ro3b-botnet/blob/main/Ro3b-botnet.exe
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot5659694192:AAFm4m__O5QDGizUpDxK2Q7lvAvGuN2DoOc
Signatures
-
Luca Stealer
Info stealer written in Rust first seen in July 2022.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
Ro3b-botnet.exeRo3b-botnet.exepid Process 1992 Ro3b-botnet.exe 1600 Ro3b-botnet.exe -
Loads dropped DLL 4 IoCs
Processes:
iexplore.exepid Process 2012 iexplore.exe 2012 iexplore.exe 2012 iexplore.exe 2012 iexplore.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 28 ip-api.com 39 ip-api.com -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = d0b694044515d901 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000777d3fee9af78041abe3f5f34583a66d00000000020000000000106600000001000020000000e9a6832c7d9c7421bff25cbdb6a4d6fa66283a6848ac851506889fa17ceeecf8000000000e8000000002000020000000c7b4b78374a5e076063b1e31afdfcbc896ad748938297ef8c9e4f1cf550926ad2000000085d9faa1b7e588fc859d1402a21a9f703619b49e4966bc3ac8a08df74f38cc5840000000fa1ad254db7688a378b7c665d6e6ba2a13c458056e9b9df80992e265c79f63109980f16a2ba83c2952674ed43f55e5d02b75698240fde8aeb1251b1e657e47fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709a65144515d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "378396373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{377B69E1-8138-11ED-B4E9-4A12BD72B3C7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
Ro3b-botnet.exeRo3b-botnet.exepid Process 1992 Ro3b-botnet.exe 1992 Ro3b-botnet.exe 1992 Ro3b-botnet.exe 1992 Ro3b-botnet.exe 1992 Ro3b-botnet.exe 1992 Ro3b-botnet.exe 1600 Ro3b-botnet.exe 1600 Ro3b-botnet.exe 1600 Ro3b-botnet.exe 1600 Ro3b-botnet.exe 1600 Ro3b-botnet.exe 1600 Ro3b-botnet.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Ro3b-botnet.exeRo3b-botnet.exedescription pid Process Token: SeShutdownPrivilege 1992 Ro3b-botnet.exe Token: SeShutdownPrivilege 1600 Ro3b-botnet.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exepid Process 2012 iexplore.exe 2012 iexplore.exe 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 2012 iexplore.exe 2012 iexplore.exe 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
iexplore.exedescription pid Process procid_target PID 2012 wrote to memory of 940 2012 iexplore.exe 27 PID 2012 wrote to memory of 940 2012 iexplore.exe 27 PID 2012 wrote to memory of 940 2012 iexplore.exe 27 PID 2012 wrote to memory of 940 2012 iexplore.exe 27 PID 2012 wrote to memory of 1992 2012 iexplore.exe 29 PID 2012 wrote to memory of 1992 2012 iexplore.exe 29 PID 2012 wrote to memory of 1992 2012 iexplore.exe 29 PID 2012 wrote to memory of 1600 2012 iexplore.exe 32 PID 2012 wrote to memory of 1600 2012 iexplore.exe 32 PID 2012 wrote to memory of 1600 2012 iexplore.exe 32
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/Pr3tor1an/-Ro3b-botnet/blob/main/Ro3b-botnet.exe1⤵
- Loads dropped DLL
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:940
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRZXZATJ\Ro3b-botnet.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRZXZATJ\Ro3b-botnet.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\Ro3b-botnet.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\Ro3b-botnet.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD552f424549b7c49d614cd6240996114d9
SHA1c1ceef5e0d4bbc1059312dfa6fc2709403083f09
SHA2561c38c54806922b2802d68373a68561a2d13cb5e097ca611fb4e9bce61ede34bc
SHA512df99ee34cdfb90bc68a4161489ea62049560ef2d740a94643b61b6460e49f5bbd65d5c7d1a18ee040f9a49b17093f7b7533c4743d74adb83b028d5906c0d80b2
-
Filesize
5KB
MD563eaa98ce2095ae7769cfe0d7ceec501
SHA12271feec422344d31966ba20c304e06cc0a19730
SHA25657f2dbf9f95dc938313a9b33f8ca0c17f5d35b453ecf7c9f88f16ab8cf868b12
SHA512887625726df292f3b2fbf6c50697acb59f1c301ee9a1bfa9a792d7fbd1b7b9eff86653b3d282a574e0737d166a8124a5499bfa233b162929b92f173f52db3db9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\Ro3b-botnet.exe
Filesize5.4MB
MD5ac090b8deb4cae9acc845999850cf37b
SHA130d0b345982e715c7f4bf72c6e58d1146bee6b3a
SHA2568026467b29f73d0c2f7b05eb84be5707139744b468f50a21d151a27b1d5d6e2d
SHA51202405030306ebb6f2b1bf46c3f043a6ccac81f08be3779bf6c0c895467fb8fc41c2c09ce8e5628b530a7ddbd265c31a3d59326bb7c5629dc154551532949566e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\Ro3b-botnet.exe.mkkufm1.partial
Filesize5.4MB
MD5ac090b8deb4cae9acc845999850cf37b
SHA130d0b345982e715c7f4bf72c6e58d1146bee6b3a
SHA2568026467b29f73d0c2f7b05eb84be5707139744b468f50a21d151a27b1d5d6e2d
SHA51202405030306ebb6f2b1bf46c3f043a6ccac81f08be3779bf6c0c895467fb8fc41c2c09ce8e5628b530a7ddbd265c31a3d59326bb7c5629dc154551532949566e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRZXZATJ\Ro3b-botnet.exe
Filesize5.4MB
MD5ac090b8deb4cae9acc845999850cf37b
SHA130d0b345982e715c7f4bf72c6e58d1146bee6b3a
SHA2568026467b29f73d0c2f7b05eb84be5707139744b468f50a21d151a27b1d5d6e2d
SHA51202405030306ebb6f2b1bf46c3f043a6ccac81f08be3779bf6c0c895467fb8fc41c2c09ce8e5628b530a7ddbd265c31a3d59326bb7c5629dc154551532949566e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRZXZATJ\Ro3b-botnet.exe.fsguh0w.partial
Filesize5.4MB
MD5ac090b8deb4cae9acc845999850cf37b
SHA130d0b345982e715c7f4bf72c6e58d1146bee6b3a
SHA2568026467b29f73d0c2f7b05eb84be5707139744b468f50a21d151a27b1d5d6e2d
SHA51202405030306ebb6f2b1bf46c3f043a6ccac81f08be3779bf6c0c895467fb8fc41c2c09ce8e5628b530a7ddbd265c31a3d59326bb7c5629dc154551532949566e
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
2.4MB
MD5d8be05f2b7386e995060449b0bd7d98d
SHA1da003a633eab89cbbad6d4df9df63924df7113e9
SHA2569b6d7f37d95c68897581383ebb211aa522769e8b2ac63f8929a4057799609f15
SHA512c64a03cfed7b22d5fa57566168a5888b72c3ff5270fce35316fa93aa77afb5b54ab878ac28bea31383e4d0970e99e26019ab22c379f1276e2493a07c75438cfa
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
40KB
MD5ab893875d697a3145af5eed5309bee26
SHA1c90116149196cbf74ffb453ecb3b12945372ebfa
SHA25602b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba
SHA5126b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
601B
MD50d4235c6343b1636768d7ed70fd7685f
SHA15bdef3a247180de1b9062ea2cccb1f32b791768c
SHA256d446f221114c3d39a4d099ce7e5d4abc3ba67dd23dc62d0f143378c42a126cc4
SHA5124a5c355f356d005411c073e28f03a8b4fc20e0c7dbac4ea7ee32ff692ef157d56601597e5fee988c26891f9866d1b9877d576d9670d32f2302f05fc41b8e3c07
-
\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\Ro3b-botnet.exe
Filesize5.4MB
MD5ac090b8deb4cae9acc845999850cf37b
SHA130d0b345982e715c7f4bf72c6e58d1146bee6b3a
SHA2568026467b29f73d0c2f7b05eb84be5707139744b468f50a21d151a27b1d5d6e2d
SHA51202405030306ebb6f2b1bf46c3f043a6ccac81f08be3779bf6c0c895467fb8fc41c2c09ce8e5628b530a7ddbd265c31a3d59326bb7c5629dc154551532949566e
-
\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\Ro3b-botnet.exe
Filesize5.4MB
MD5ac090b8deb4cae9acc845999850cf37b
SHA130d0b345982e715c7f4bf72c6e58d1146bee6b3a
SHA2568026467b29f73d0c2f7b05eb84be5707139744b468f50a21d151a27b1d5d6e2d
SHA51202405030306ebb6f2b1bf46c3f043a6ccac81f08be3779bf6c0c895467fb8fc41c2c09ce8e5628b530a7ddbd265c31a3d59326bb7c5629dc154551532949566e
-
\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRZXZATJ\Ro3b-botnet.exe
Filesize5.4MB
MD5ac090b8deb4cae9acc845999850cf37b
SHA130d0b345982e715c7f4bf72c6e58d1146bee6b3a
SHA2568026467b29f73d0c2f7b05eb84be5707139744b468f50a21d151a27b1d5d6e2d
SHA51202405030306ebb6f2b1bf46c3f043a6ccac81f08be3779bf6c0c895467fb8fc41c2c09ce8e5628b530a7ddbd265c31a3d59326bb7c5629dc154551532949566e
-
\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRZXZATJ\Ro3b-botnet.exe
Filesize5.4MB
MD5ac090b8deb4cae9acc845999850cf37b
SHA130d0b345982e715c7f4bf72c6e58d1146bee6b3a
SHA2568026467b29f73d0c2f7b05eb84be5707139744b468f50a21d151a27b1d5d6e2d
SHA51202405030306ebb6f2b1bf46c3f043a6ccac81f08be3779bf6c0c895467fb8fc41c2c09ce8e5628b530a7ddbd265c31a3d59326bb7c5629dc154551532949566e